Our Research Mission

The mission of the Cryptography and Privacy Engineering Group (ENCRYPTO) is to demonstrate that privacy can be efficiently protected in real-world applications. For this, we bring theory into practice by using methods from applied cryptography and algorithm engineering for developing protocols, tools, and software prototypes to efficiently protect sensitive data in various application scenarios.

Our Reseach Topics

As shown below for our research sub-areas, our excellent research is highly recognized, we were often among the first in the respective research area, and our aim is to publish our results at top venues in IT security/applied cryptography (top conferences with CORE ranking A* or A marked in bold below).

We are always open to industry partners who want to support our research in these areas.

Awards

Publications (selection)

One of the core competencies of the ENCRYPTO group is building tools that make efficient secure multi-party computation accessible to non-experts. We make our tools available as open source and they are used by several research groups and industry.

Awards

Publications (selection)

Privacy-preserving machine learning allows to run machine learning algorithms while protecting both the data and the models. This can be achieved by using secure computation techniques.

Awards

  • 2019 Intel Research Award: The ENCRYPTO group was awarded by Intel Corporation for our research in the area of “Secure and Privacy Preserving AI Frameworks and Run-Times for Data Scientists and Service Providers”.

Publications (selection)

Private set intersection (PSI) allows two or multiple parties to jointly compute the intersection of their input sets without leaking any information about elements that are not in the intersection. PSI has many applications such as contact discovery in mobile messengers like Signal or Whatsapp, or measuring ad conversion rates as run by Google and merchants. We are mostly interested in improving the efficiency of PSI protocols for practical applications. Watch our explanatory video on YouTube.

Awards

Publications (selection)

Private function evaluation allows to securely evaluate a private function on private data while protecting both the function and the data. This has many applications such as user-specific insurance tarifs or private ML inference that also protects the ML models.

Awards

  • 2018 Heidelberg Laureate Forum: Ágnes Kiss was invited to the Heidelberg Laureate Forum 2018 for her outstanding research on Private Function Evaluation.
  • 2018 CAST IT Security Award: Daniel Günther with his work on “Valiant’s Universal Circuit – Towards a Modular Construction and Implementation” won the first prize among three finalists in the category “Best Bachelor Thesis” at the CAST IT Security Award 2018.

Publications (selection)

We have strong expertise in applying cryptographic protocols to improve privacy in real-world applications. This often involves exciting and very fruitful interdisciplinary research with other areas.

Awards

Publications (selection)

We improve the efficiency and practicality of cryptographic protocols and in particular of secure computation protocols.

Publications (selection)

Hardware-assisted cryptographic protocols allow to improve the efficiency and/or security of cryptographic protocols by using trusted hardware such as smartcards or trusted execution environments like Intel SGX or ARM TrustZone or hardware accelerators.

Publications (selection)

We also analyze and attack the privacy and security of real-world systems and research papers and propose alternatives.

Publications (selection)